IOC Report
SecuriteInfo.com.Trojan.Siggen27.33484.28759.31674.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Siggen27.33484.28759.31674.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\ACCApi\apihost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.Siggen27.33484.28759.31674.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\apihost.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9DAB.tmp.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\ACCApi\apihost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Thu Mar 28 08:25:27 2024, mtime=Thu Mar 28 08:25:27 2024, atime=Thu Mar 28 08:25:24 2024, length=187904, window=
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen27.33484.28759.31674.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen27.33484.28759.31674.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 10:30 /du 23:59 /sc daily /ri 1 /f
malicious
C:\Users\user\AppData\Roaming\ACCApi\apihost.exe
"C:\Users\user\AppData\Roaming\ACCApi\apihost.exe"
malicious
C:\Users\user\AppData\Roaming\ACCApi\apihost.exe
C:\Users\user\AppData\Roaming\ACCApi\apihost.exe
malicious
C:\Users\user\AppData\Roaming\ACCApi\apihost.exe
"C:\Users\user\AppData\Roaming\ACCApi\apihost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp9DAB.tmp.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 6

Domains

Name
IP
Malicious
windowsupdatebg.s.llnwi.net
69.164.0.0

Memdumps

Base Address
Regiontype
Protect
Malicious
A93000
trusted library allocation
page read and write
152E000
stack
page read and write
293F000
trusted library allocation
page read and write
64B0000
trusted library allocation
page execute and read and write
13AE000
stack
page read and write
2480000
trusted library allocation
page read and write
2667000
trusted library allocation
page read and write
7B6000
heap
page read and write
660000
heap
page read and write
A03000
trusted library allocation
page execute and read and write
342F000
stack
page read and write
28AF000
trusted library allocation
page read and write
35AC000
trusted library allocation
page read and write
A14000
trusted library allocation
page read and write
2C3E000
stack
page read and write
650000
heap
page read and write
B9A000
heap
page read and write
55B0000
trusted library allocation
page read and write
64E0000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
A84000
trusted library allocation
page read and write
30FF000
unkown
page read and write
780000
heap
page read and write
148C000
heap
page read and write
BFC000
heap
page read and write
6570000
heap
page read and write
167D000
trusted library allocation
page execute and read and write
A80000
trusted library allocation
page read and write
A0E000
stack
page read and write
3550000
heap
page read and write
1690000
trusted library allocation
page read and write
278E000
stack
page read and write
32C0000
trusted library allocation
page read and write
4CD8000
trusted library allocation
page read and write
6510000
trusted library allocation
page read and write
168A000
trusted library allocation
page execute and read and write
2C7F000
stack
page read and write
58EE000
stack
page read and write
25E4000
trusted library allocation
page read and write
15BB000
trusted library allocation
page execute and read and write
267E000
stack
page read and write
C19000
heap
page read and write
7A3000
heap
page read and write
2610000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
C15000
heap
page read and write
24B4000
trusted library allocation
page read and write
4031000
trusted library allocation
page read and write
4C8B000
trusted library allocation
page read and write
8BE000
stack
page read and write
25D4000
trusted library allocation
page read and write
14E0000
heap
page read and write
170B000
heap
page read and write
242E000
stack
page read and write
9BF000
stack
page read and write
5190000
heap
page read and write
15E0000
trusted library allocation
page read and write
16D9000
heap
page read and write
520D000
stack
page read and write
510C000
stack
page read and write
A90000
trusted library allocation
page read and write
313E000
stack
page read and write
31FB000
heap
page read and write
9C0000
heap
page read and write
5940000
heap
page read and write
1590000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
4A6E000
stack
page read and write
5B0000
heap
page read and write
4C80000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
655000
heap
page read and write
2470000
trusted library allocation
page execute and read and write
16B0000
trusted library allocation
page read and write
4CA1000
trusted library allocation
page read and write
1663000
trusted library allocation
page execute and read and write
31BE000
stack
page read and write
5F4E000
stack
page read and write
1610000
heap
page read and write
36B5000
trusted library allocation
page read and write
2956000
trusted library allocation
page read and write
A83000
trusted library allocation
page execute and read and write
5B4F000
stack
page read and write
740000
heap
page read and write
3841000
trusted library allocation
page read and write
2605000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
2679000
trusted library allocation
page read and write
4ECE000
stack
page read and write
55E0000
trusted library allocation
page read and write
2660000
trusted library allocation
page read and write
ABB000
trusted library allocation
page execute and read and write
297C000
stack
page read and write
A10000
trusted library allocation
page read and write
2619000
trusted library allocation
page read and write
23EF000
stack
page read and write
31FF000
stack
page read and write
BF0000
heap
page read and write
A8D000
trusted library allocation
page execute and read and write
109B000
stack
page read and write
4AE0000
heap
page read and write
61ED000
stack
page read and write
4D8E000
stack
page read and write
1170000
heap
page read and write
12A5000
heap
page read and write
556E000
trusted library allocation
page read and write
B7A000
heap
page read and write
1740000
heap
page read and write
322D000
heap
page read and write
4C86000
trusted library allocation
page read and write
322E000
heap
page read and write
A37000
trusted library allocation
page execute and read and write
51A0000
heap
page read and write
58AE000
stack
page read and write
6500000
trusted library allocation
page execute and read and write
25E0000
trusted library allocation
page read and write
1039000
stack
page read and write
2680000
heap
page read and write
493E000
stack
page read and write
321D000
heap
page read and write
2C80000
heap
page read and write
25EE000
trusted library allocation
page read and write
B70000
heap
page read and write
26A0000
heap
page execute and read and write
1530000
heap
page read and write
15C0000
heap
page read and write
58D0000
heap
page execute and read and write
508E000
stack
page read and write
293C000
stack
page read and write
55B8000
trusted library allocation
page read and write
5C4F000
stack
page read and write
2630000
trusted library allocation
page read and write
317F000
unkown
page read and write
5550000
trusted library allocation
page read and write
347F000
heap
page read and write
B6C000
stack
page read and write
5FE000
stack
page read and write
D40000
heap
page read and write
5576000
trusted library allocation
page read and write
E6F000
stack
page read and write
1137000
stack
page read and write
5D4E000
stack
page read and write
60EE000
stack
page read and write
25CE000
stack
page read and write
1660000
trusted library allocation
page read and write
4CB3000
trusted library allocation
page read and write
BB0000
heap
page read and write
4C94000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
28C5000
trusted library allocation
page read and write
345F000
heap
page read and write
1697000
trusted library allocation
page execute and read and write
BF2000
heap
page read and write
26B1000
trusted library allocation
page read and write
555B000
trusted library allocation
page read and write
1197000
stack
page read and write
AB7000
trusted library allocation
page execute and read and write
4435000
trusted library allocation
page read and write
5554000
trusted library allocation
page read and write
C3E000
heap
page read and write
162E000
stack
page read and write
3264000
trusted library allocation
page read and write
2830000
heap
page execute and read and write
1728000
heap
page read and write
2ED0000
heap
page read and write
3254000
trusted library allocation
page read and write
3E7000
stack
page read and write
2C88000
heap
page read and write
12A0000
heap
page read and write
7ED000
heap
page read and write
325B000
trusted library allocation
page read and write
31F0000
heap
page read and write
16FE000
stack
page read and write
288E000
trusted library allocation
page read and write
15B7000
trusted library allocation
page execute and read and write
4CC0000
trusted library allocation
page read and write
169B000
trusted library allocation
page execute and read and write
3040000
heap
page read and write
5CEE000
stack
page read and write
2D4D000
stack
page read and write
1412000
heap
page read and write
4431000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
33EF000
stack
page read and write
1664000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
AAA000
trusted library allocation
page execute and read and write
1410000
heap
page read and write
1630000
heap
page read and write
16B0000
heap
page read and write
5565000
trusted library allocation
page read and write
4A2E000
stack
page read and write
2915000
trusted library allocation
page read and write
4CC5000
trusted library allocation
page read and write
A46000
heap
page read and write
33E0000
heap
page read and write
5AEE000
stack
page read and write
4FAB000
unkown
page read and write
4BEF000
stack
page read and write
3240000
heap
page execute and read and write
5E4E000
stack
page read and write
321D000
heap
page read and write
B20000
heap
page read and write
18AF000
stack
page read and write
1584000
trusted library allocation
page read and write
52CE000
stack
page read and write
330E000
stack
page read and write
B40000
heap
page read and write
BBC000
heap
page read and write
A3B000
trusted library allocation
page execute and read and write
3320000
heap
page read and write
4CB5000
trusted library allocation
page read and write
347F000
heap
page read and write
AAD000
stack
page read and write
24B7000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
2DF0000
heap
page read and write
1400000
heap
page read and write
1455000
heap
page read and write
4039000
trusted library allocation
page read and write
B7E000
heap
page read and write
5A0000
heap
page read and write
2964000
trusted library allocation
page read and write
1686000
trusted library allocation
page execute and read and write
BA5000
heap
page read and write
4C9E000
trusted library allocation
page read and write
321B000
heap
page read and write
3285000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
29F0000
heap
page read and write
5562000
trusted library allocation
page read and write
50AC000
stack
page read and write
16B7000
heap
page read and write
1000000
trusted library allocation
page execute and read and write
A9E000
stack
page read and write
4CA6000
trusted library allocation
page read and write
1950000
trusted library allocation
page execute and read and write
32B5000
trusted library allocation
page read and write
2E8E000
stack
page read and write
1965000
trusted library allocation
page read and write
303E000
unkown
page read and write
530E000
stack
page read and write
1990000
heap
page read and write
171A000
heap
page read and write
25D6000
trusted library allocation
page read and write
4C82000
trusted library allocation
page read and write
50EE000
stack
page read and write
1010000
trusted library allocation
page read and write
5582000
trusted library allocation
page read and write
24C0000
heap
page read and write
404E000
trusted library allocation
page read and write
552E000
stack
page read and write
55A0000
trusted library allocation
page read and write
322E000
heap
page read and write
3014000
trusted library allocation
page read and write
8F7000
stack
page read and write
28F7000
trusted library allocation
page read and write
33F0000
heap
page read and write
556A000
trusted library allocation
page read and write
472000
unkown
page readonly
1730000
heap
page execute and read and write
4CA9000
trusted library allocation
page read and write
29B0000
heap
page read and write
2D8A000
stack
page read and write
BAD000
stack
page read and write
53B000
stack
page read and write
559F000
trusted library allocation
page read and write
1700000
trusted library allocation
page execute and read and write
3845000
trusted library allocation
page read and write
246E000
stack
page read and write
3031000
trusted library allocation
page read and write
1692000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
3271000
trusted library allocation
page read and write
64A0000
heap
page read and write
4C84000
trusted library allocation
page read and write
3297000
trusted library allocation
page read and write
5BEE000
stack
page read and write
4DE0000
heap
page read and write
13DE000
heap
page read and write
13D0000
heap
page read and write
16E8000
heap
page read and write
5038000
trusted library allocation
page read and write
145A000
heap
page read and write
146B000
heap
page read and write
5DEE000
stack
page read and write
3020000
heap
page read and write
16CD000
heap
page read and write
788000
heap
page read and write
326E000
trusted library allocation
page read and write
1404000
heap
page read and write
559C000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
538D000
stack
page read and write
3060000
heap
page read and write
1713000
heap
page read and write
25F1000
trusted library allocation
page read and write
3210000
heap
page read and write
3256000
trusted library allocation
page read and write
2FEE000
stack
page read and write
470000
unkown
page readonly
55A5000
trusted library allocation
page read and write
323E000
stack
page read and write
4F8E000
stack
page read and write
9F0000
trusted library allocation
page read and write
166D000
trusted library allocation
page execute and read and write
16AE000
stack
page read and write
D6E000
stack
page read and write
321F000
heap
page read and write
592E000
stack
page read and write
1594000
trusted library allocation
page read and write
13D8000
heap
page read and write
3849000
trusted library allocation
page read and write
2958000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
287D000
trusted library allocation
page read and write
1020000
heap
page read and write
24B0000
trusted library allocation
page read and write
25DB000
trusted library allocation
page read and write
1583000
trusted library allocation
page execute and read and write
C20000
heap
page read and write
AA6000
trusted library allocation
page execute and read and write
1680000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
4AAE000
stack
page read and write
1720000
trusted library allocation
page read and write
321E000
heap
page read and write
1673000
trusted library allocation
page read and write
13F7000
heap
page read and write
2EB000
stack
page read and write
760000
heap
page read and write
16D2000
heap
page read and write
B8F000
heap
page read and write
2ECF000
stack
page read and write
534E000
stack
page read and write
32B0000
trusted library allocation
page read and write
36B1000
trusted library allocation
page read and write
4750000
heap
page read and write
1960000
trusted library allocation
page read and write
A40000
heap
page read and write
1670000
trusted library allocation
page read and write
A04000
trusted library allocation
page read and write
1250000
heap
page read and write
557D000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
5A4E000
stack
page read and write
1710000
heap
page read and write
2625000
trusted library allocation
page read and write
D3E000
unkown
page read and write
129D000
stack
page read and write
35AE000
trusted library allocation
page read and write
2485000
trusted library allocation
page read and write
146F000
heap
page read and write
B1E000
stack
page read and write
A20000
heap
page read and write
4E8E000
stack
page read and write
166E000
stack
page read and write
2620000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
31E8000
trusted library allocation
page read and write
BB2000
heap
page read and write
4CD0000
trusted library allocation
page read and write
There are 354 hidden memdumps, click here to show them.